I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.

Please check the box if you want to proceed.

I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.

Please check the box if you want to proceed.

By submitting my Email address I confirm that I have read and accepted the Terms of Use and Declaration of Consent.

courses that you can take on your own time, at your own pace.

These lessons -- many of which feature video seminars and review quizzes eligible for CPE credits -- will arm you with the foundational and tactical information needed to keep your organization compliant and secure.

From cloud security and data protection to identity and access management and messaging security -- SearchSecurity has you covered.

CISSP Certification Essentials

Our exclusive CISSP Essentials trainings feature expert content from exam trainer Logical Security and (ISC)2,global information security educator and certification leader. In the following domains explore the fundamental concepts, technologies and practices of information systems security. Each lesson corresponds to a subject domain in the exam's "Common Body of Knowledge" -- the essential elements each CISSP-certified practitioner must know.

Cloud Security School

In these lessons the industry's foremost cloud security experts explain how to securely take advantage of the flexible infrastructure models and lower operating costs that make the cloud an attractive alternative for many enterprise IT organizations.

Solving enterprise cloud security challenges: In-house or CSPs? In this lesson, take a look at cloud security challenges enterprises today are facing and gain insight into the latest cloud security provider developments and improvements which aim to help enterprises tackle their problems.Featuring Dave Shackleford, owner and principal consultant, Voodoo Security

Cloud-based identity and access managementCloud security expert Dave Shackleford discusses the risks and rewards of cloud-centric identity and access management, outlines how to know if it's the best choice for your enterprise, and offers numerous tips for a successful cloud IAM implementation.Featuring Dave Shackleford, owner and principal consultant, Voodoo Security

Intrusion Defense School

These lessons help put the pieces of intrusion defense -- antivirus, antispyware, IDS/IPS, etc. -- in perspective to help you implement an intrusion defense strategy that meets your organization's needs.

Securing IoT in the enterpriseThis Security School offers advice on securing IoT devices, to help infosec pros ensure the connected devices that end users deploy do no harm to enterprise network. Featuring Dan Sullivan

Network perimeter security Learn about the pressures transforming the enterprise network perimeter and how to adapt your strategy for network perimeter security.Featuring Johna Till Johnson, CEO and founder of Nemertes Research

Join the conversation

3 comments

Register

I agree to TechTarget’s Terms of Use, Privacy Policy, and the transfer of my information to the United States for processing to provide me with relevant information as described in our Privacy Policy.

Please check the box if you want to proceed.

I agree to my information being processed by TechTarget and its Partners to contact me via phone, email, or other means regarding information relevant to my professional interests. I may unsubscribe at any time.